Constellation Package
- All of the Star package features
- Backup & Recovery
- Asset Management
- Storage Management
Backup & Recovery
Progress Technologies “Constellation” plan’s backup and recovery solution offers comprehensive data protection with key features including cross-platform support, multiple backup types (file-level and image-based), centralized management, strong security measures (encryption and immutability), and flexible cloud storage options.
- Cross-Platform Support: Protects endpoints across various operating systems, including Windows, macOS, Linux, Windows Server, MS SQL Server, VMware, and Hyper-V.
- SaaS Backup: Provides cloud-to-cloud data protection for Microsoft 365 (Exchange Online, OneDrive, Contacts, Calendar, SharePoint, Teams) and Google Workspace, with item-level backup and restore capabilities.
- File and Folder Backup: Allows for granular selection and backup of specific files and folders.
- Image-Based Backup: Creates a complete system snapshot, including the OS, applications, and data, for full disaster recovery and bare-metal restores (BMR).
- Application-Aware Backup: Supports consistent backups for applications like MS SQL Server and Exchange, including transaction log backups.
- Incremental and Differential Backups: Optimizes backup time and storage with incremental and differential backup options, including a "Forever Forward Incremental" approach that keeps only one full backup generation in storage.
Constellation Package
- Features
- Device Health Checks
- Security Alerting
- Network Monitoring
- Performance thresholds
- Automated Reporting
- Alert Notifications
- 24/7 Help Desk
- Patch Management
- Antivirus Protection
- Malware Protection
- Ransomware Security
- Backup & Recovery
- Asset Management
- Synthetic Full Backup: Reduces the amount of data uploaded by creating a new full backup from the existing full and incremental copies in the cloud.
- Changed Block Tracking (CBT): Speeds up Hyper-V and VMware backups by only backing up the data blocks that have changed since the last backup.
- Advanced Encryption: Protects data both at rest and in transit with strong AES 128-, 192-, and 256-bit encryption, with users retaining control over their encryption keys.
- Immutable Backups (Object Lock): Offers the highest level of protection against ransomware, accidental deletion, and unauthorized access by making backup copies unalterable for a set period when using compatible storage.
- Role-Based Access Control (RBAC): Enables administrators to set different permission levels, limiting access to sensitive data and functions.
- Compliance Ready: Features like customizable retention policies, audit logs, and encryption help meet regulatory requirements like HIPAA and GDPR.
- Bare-Metal Recovery (BMR): Allows the restoration of an entire system to the original, different (dissimilar) hardware, or a virtual machine.
- Granular/Item-Level Restore: Enables fast recovery of individual files, folders, or mailbox items from an image-based backup or SaaS backup.
- Bootable Recovery Media: Users can create a bootable USB drive or ISO file for easy system recovery in case of a crash.
- Centralized Management Console: Provides a single pane of glass for us to remotely manage all backup and restore jobs, monitor statuses, deploy software, and manage licenses across all client endpoints.
- Automated Scheduling and Notifications: Configures automated, flexible backup schedules and sends email or mobile app notifications for plan results, status updates, and alerts.
- Bring-Your-Own-Storage (BYOS): Offers flexibility and avoids vendor lock-in by supporting various third-party cloud storage providers or local storage.
- Restore Verification: Includes checks to confirm backup integrity and ensure that data in storage is restorable.
Asset Management
Progress Technologies “Constellation” plan Asset Management features include automated asset discovery for a complete and accurate inventory, detailed asset tracking with both agent and agentless options, and lifecycle management to manage assets throughout their entire history. It also integrates asset management with patch management and provides topology mapping for a holistic network view, enabling proactive problem-solving and security.
- Automated Discovery: Uses network probes to automatically scan and discover all network devices, creating an up-to-date inventory of systems and their states.
- Comprehensive Inventory: Provides agent and agentless asset inventory, including visibility into virtual machines and network devices from manufacturers like Cisco, Dell, and HP.
- Integrated Patch Management: Tracks assets and fully integrates patch management to ensure all devices are up-to-date with the latest security patches and software updates.
- Network Topology Mapping: Creates a visual map of your entire network, helping you identify vulnerabilities and understand the relationships between assets.
- Lifecycle Management: Supports asset management throughout the entire lifecycle, from deployment to retirement, ensuring all aspects of the asset are managed.
- Financial Data Tracking: Connects asset tracking with financial data to help manage costs associated with hardware and software acquisition and maintenance.
- Proactive Monitoring and Automation: Combines asset data with real-time monitoring to identify and resolve issues before they become critical, often before the user even notices.
- Agent Deployment Automation: Automates the deployment of agents to supported endpoints, simplifying the process in environments without Active Directory Group Policies.
Storage Management
Progress Technologies “Constellation” plan offers storage management features including Object Lock for immutable, WORM (write once, read many) storage, Lifecycle Rules to automatically delete old file versions, Cloud Replication to automatically copy data to other locations for redundancy, and robust security options like S3-compatible access keys, MFA, and SSO support. It also provides event notifications to automate tasks and custom upload timestamps for compliance and version tracking.
- Object Lock: Provides immutable storage to protect against accidental or malicious deletion by making data WORM (write once, read many).
- Lifecycle Rules: Allows you to automatically delete older versions of files after a set period, helping to manage storage space and costs.
- Cloud Replication: Automatically copies data to different locations for enhanced redundancy, compliance, and fast access, without extra service or egress fees.
- Event Notifications: Triggers instant alerts for data changes, which can be used to automate other processes like video transcoding or asset tracking.
- Custom Upload Timestamps: Allows you to specify an object's original creation or upload time, which is useful for regulatory compliance, legal requirements, and accurate version tracking.
- S3-Compatible API: Provides a standard way to integrate with a wide range of tools and SDKs.
- Multi-Bucket Application Keys: Enables creating access keys that are restricted to specific groups of buckets for more granular control.
- Scalable Application Keys: Allows you to generate a large number of short-lived keys per minute, which reduces the security exposure window for high-volume operations.
- Mandatory MFA and SSO Support: Includes built-in zero-trust security features like multi-factor authentication and single sign-on support for enterprise users.